aboutsummaryrefslogtreecommitdiffstats
path: root/target-openrisc/exception_helper.c
diff options
context:
space:
mode:
authorMichael S. Tsirkin <mst@redhat.com>2014-04-28 16:08:23 +0300
committerJuan Quintela <quintela@redhat.com>2014-05-05 22:15:03 +0200
commita890a2f9137ac3cf5b607649e66a6f3a5512d8dc (patch)
treef2556f0707b771bb328990b803c2a660dec88faa /target-openrisc/exception_helper.c
parentvirtio-net: out-of-bounds buffer write on load (diff)
downloadqemu-a890a2f9137ac3cf5b607649e66a6f3a5512d8dc.tar.xz
qemu-a890a2f9137ac3cf5b607649e66a6f3a5512d8dc.zip
virtio: validate config_len on load
Malformed input can have config_len in migration stream exceed the array size allocated on destination, the result will be heap overflow. To fix, that config_len matches on both sides. CVE-2014-0182 Reported-by: "Dr. David Alan Gilbert" <dgilbert@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Juan Quintela <quintela@redhat.com> -- v2: use %ix and %zx to print config_len values Signed-off-by: Juan Quintela <quintela@redhat.com>
Diffstat (limited to 'target-openrisc/exception_helper.c')
0 files changed, 0 insertions, 0 deletions